首页> 外文会议>Number-theoretic methods in cryptology >Generation and Implementation of Cryptographically Strong Elliptic Curves
【24h】

Generation and Implementation of Cryptographically Strong Elliptic Curves

机译:加密强椭圆曲线的生成和实现

获取原文
获取原文并翻译 | 示例

摘要

Elliptic curves over finite fields are an essential part of public key cryptography. The security of cryptosystems with elliptic curves is based on the computational intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). The paper presents requirements which cryptographically secure elliptic curves have to satisfy, together with their justification and some relevant examples of elliptic curves. We implemented modular arithmetic in a finite field, the operations on an elliptic curve and the basic cryptographic protocols.
机译:有限域上的椭圆曲线是公钥密码学的重要组成部分。具有椭圆曲线的密码系统的安全性基于椭圆曲线离散对数问题(ECDLP)的计算难点性。本文提出了密码学上安全的椭圆曲线必须满足的要求,以及它们的合理性和椭圆曲线的一些相关示例。我们在有限域中实现了模块化算法,对椭圆曲线进行了运算,并实现了基本的密码协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号